CVE‑2025‑9242
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,抓住主要信息。 文章讲的是WatchGuard Firebox和Fireware OS中的一个漏洞,具体是iked组件中的一个远程可利用的溢出写漏洞。这个漏洞可以通过特制的IKEv2数据包触发,可能导致未认证的代码执行。受影响的版本包括多个Fireware OS版本,其中11.x已经停止支持,但其他分支有补丁可用。PoC在10月16日公开。 成功利用这个漏洞可能导致设备完全被控制,比如获取持久shell、窃取配置和VPN凭证。攻击者还能解密VPN流量,进入内部网络,并长期驻留在设备中,导致数据泄露和横向移动。 虽然目前没有活跃利用的报告,但由于WatchGuard设备的重要性,修复漏洞很紧急。文章还提到了NodeZero平台用于持续检测和修复漏洞。 总结的时候要包含:漏洞名称、影响范围、可能后果、PoC公开时间以及修复建议。控制在100字以内,直接描述内容。 </think> WatchGuard Firebox/Fireware OS存在一个远程可利用的溢出写漏洞(CVE-2023-25845),通过特制IKEv2数据包触发,可能导致未认证代码执行。该漏洞影响多个版本(如11.10.2至12.11.3),已公开PoC(2023年10月)。成功利用可导致设备完全被控、VPN流量解密及内部网络入侵。尽管尚未报告活跃攻击,修复建议紧急。 2025-10-29 21:18:48 Author: horizon3.ai(查看原文) 阅读量:5 收藏

WatchGuard Firebox / Fireware OS iked Out‑of‑Bounds Write

A remotely exploitable out‑of‑bounds write in the IKE/IKEv2 handler (iked) of WatchGuard Firebox/Fireware OS can be triggered by specially crafted IKEv2 packets, potentially enabling unauthenticated code execution on vulnerable devices. Affected releases include Fireware OS 11.10.2 up to and including 11.12.4_Update1, 12.0 up to and including 12.11.3, and 2025.1; 11.x is end‑of‑life, and patches are available for supported branches. A PoC was made public on  October 16.

Successful exploitation can yield full device compromise (persistent shell, configuration theft, VPN credential exposure), allow attackers to decrypt or intercept VPN traffic, pivot into internal networks, and persist in a trusted security appliance — outcomes that lead directly to data theft, lateral movement and long dwell times. 

While there is no report of active exploitation, the reach and importance of WatchGuard’s devices makes identifying and patching vulnerable instances urgent, given attackers commonly will seek to weaponize flaws after disclosure. 

Find and fix urgent exploitation risk with Rapid Response

Stop Guessing, Start Proving

Read about other CVEs

NodeZero® Platform

Implement a continuous find, fix, and verify loop with NodeZero

The NodeZero® platform empowers your organization to reduce your security risks by autonomously finding exploitable weaknesses in your network, giving you detailed guidance around how to priortize and fix them, and having you immediately verify that your fixes are effective.

Explore NodeZero

Recognized By


文章来源: https://horizon3.ai/attack-research/vulnerabilities/cve2025-9242/
如有侵权请联系:admin#unsafe.sh